2018
DOI: 10.1515/popets-2018-0032
|View full text |Cite
|
Sign up to set email alerts
|

Differentially Private Oblivious RAM

Abstract: In this work, we investigate if statistical privacy can enhance the performance of ORAM mechanisms while providing rigorous privacy guarantees. We propose a formal and rigorous framework for developing ORAM protocols with statistical security viz., a differentially private ORAM (DP-ORAM). We present Root ORAM, a family of DP-ORAMs that provide a tunable, multi-dimensional trade-off between the desired bandwidth overhead, local storage and system security. We theoretically analyze Root ORAM to quantify both its… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
22
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(24 citation statements)
references
References 41 publications
(64 reference statements)
0
22
0
Order By: Relevance
“…This work directly inspired us to consider a more general approach to modeling leakage in secure computation through differential privacy. Wagh et al [35] define and construct differentially private ORAM in which the server's views are "similar" on two neighboring access patterns. They consider the client/server model, and don't consider using their construction in a secure computation, but it is very interesting to note that we could use their result in a generic way to build a protocol for generic secure computation with differentially private access patterns.…”
Section: Contributions and Related Workmentioning
confidence: 99%
“…This work directly inspired us to consider a more general approach to modeling leakage in secure computation through differential privacy. Wagh et al [35] define and construct differentially private ORAM in which the server's views are "similar" on two neighboring access patterns. They consider the client/server model, and don't consider using their construction in a secure computation, but it is very interesting to note that we could use their result in a generic way to build a protocol for generic secure computation with differentially private access patterns.…”
Section: Contributions and Related Workmentioning
confidence: 99%
“…In addition to the prior work [5,19,24] that a empted to combine DP and secure computation techniques in order to scale-up the PRL problem, there are other e orts that take similar approaches, but focus on solving di erent problems. Wagh et al [39] formalized the notion of di erentially private oblivious RAM (DP ORAM) and their corresponding protocols signi cantly improved the bandwidth overheads with a relaxed privacy guarantee. is privacy notion considers a client-server model where all data sit on a single server, while DPRL considers two party computation.…”
Section: Related Workmentioning
confidence: 99%
“…Once again, this construction seems to be the best privacy that can be achieved by any DP-RAM scheme with only O(1) overhead over the baseline, unprotected storage access due to our lower bounds. Our scheme improves on prevous DP-RAM schemes in [50] which starts from Path ORAM [48] and degrades security to improve efficiency. For their scheme to achieve even client storage of O( √ n), their construction recursively stores position maps which costs both logarithmic overhead and client-to-server roundtrips.…”
Section: Introductionmentioning
confidence: 99%
“…Related Work. DP-RAM was considered previously in [50] which present a construction based on Path ORAM [48]. However, their scheme requires recursively stored position maps which requires Θ(log n) client-to-server roundtrips to get client storage of even O( √ n).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation